CVE-2022-49321: Vulnerability in Linux Linux
In the Linux kernel, the following vulnerability has been resolved: xprtrdma: treat all calls not a bcall when bc_serv is NULL When a rdma server returns a fault format reply, nfs v3 client may treats it as a bcall when bc service is not exist. The debug message at rpcrdma_bc_receive_call are, [56579.837169] RPC: rpcrdma_bc_receive_call: callback XID 00000001, length=20 [56579.837174] RPC: rpcrdma_bc_receive_call: 00 00 00 01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 04 After that, rpcrdma_bc_receive_call will meets NULL pointer as, [ 226.057890] BUG: unable to handle kernel NULL pointer dereference at 00000000000000c8 ... [ 226.058704] RIP: 0010:_raw_spin_lock+0xc/0x20 ... [ 226.059732] Call Trace: [ 226.059878] rpcrdma_bc_receive_call+0x138/0x327 [rpcrdma] [ 226.060011] __ib_process_cq+0x89/0x170 [ib_core] [ 226.060092] ib_cq_poll_work+0x26/0x80 [ib_core] [ 226.060257] process_one_work+0x1a7/0x360 [ 226.060367] ? create_worker+0x1a0/0x1a0 [ 226.060440] worker_thread+0x30/0x390 [ 226.060500] ? create_worker+0x1a0/0x1a0 [ 226.060574] kthread+0x116/0x130 [ 226.060661] ? kthread_flush_work_fn+0x10/0x10 [ 226.060724] ret_from_fork+0x35/0x40 ...
AI Analysis
Technical Summary
CVE-2022-49321 is a vulnerability identified in the Linux kernel's handling of Remote Direct Memory Access (RDMA) transport for the Network File System (NFS) version 3 protocol, specifically within the xprtrdma module. The vulnerability arises when the RDMA server returns a fault format reply, but the NFSv3 client incorrectly treats this reply as a callback (bcall) despite the absence of a bc_serv (callback service). This misinterpretation leads to the rpcrdma_bc_receive_call function dereferencing a NULL pointer, causing a kernel NULL pointer dereference and resulting in a kernel crash (BUG). The kernel panic is triggered during the execution of the _raw_spin_lock function, as indicated by the call trace, which includes rpcrdma_bc_receive_call and ib_core module functions. This vulnerability can cause a denial of service (DoS) by crashing the affected Linux kernel, disrupting services relying on NFS over RDMA. The issue is rooted in improper validation of callback service presence before processing RDMA replies, leading to unsafe memory access. The vulnerability affects specific Linux kernel versions identified by the commit hash 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2, and no known exploits have been reported in the wild as of the publication date (February 26, 2025). No CVSS score has been assigned to this vulnerability yet.
Potential Impact
For European organizations, the impact of CVE-2022-49321 can be significant, especially for those relying on Linux servers using NFSv3 over RDMA for high-performance networked storage. The vulnerability can lead to kernel crashes, causing service interruptions and potential data availability issues. This is particularly critical for enterprises in sectors such as finance, telecommunications, research institutions, and cloud service providers that depend on stable and performant NFS storage solutions. The denial of service caused by this vulnerability could disrupt business operations, lead to downtime, and require emergency patching or system reboots, impacting operational continuity. Although no direct data breach or privilege escalation is indicated, repeated crashes could increase the risk of data corruption or loss in unstable environments. The absence of known exploits reduces immediate risk, but the vulnerability's presence in widely used Linux kernels means that attackers could develop exploits, especially targeting high-value infrastructure in Europe.
Mitigation Recommendations
To mitigate CVE-2022-49321, European organizations should: 1) Identify and inventory Linux systems using NFSv3 over RDMA, focusing on those running affected kernel versions (notably those around the commit 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2). 2) Apply the latest Linux kernel patches or updates that address this vulnerability as soon as they become available from trusted Linux distributions or upstream kernel sources. 3) If immediate patching is not feasible, consider disabling RDMA transport for NFS or fallback to TCP transport temporarily to avoid triggering the vulnerable code path. 4) Monitor kernel logs for messages related to rpcrdma_bc_receive_call or unexpected kernel panics indicative of exploitation attempts. 5) Implement robust system monitoring and alerting to detect and respond to kernel crashes promptly. 6) Engage with Linux distribution security advisories and subscribe to vulnerability feeds to stay informed about patch releases and exploit developments. 7) Test patches in controlled environments before deployment to ensure stability and compatibility with existing workloads.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Finland, Denmark, Italy, Spain, Poland
CVE-2022-49321: Vulnerability in Linux Linux
Description
In the Linux kernel, the following vulnerability has been resolved: xprtrdma: treat all calls not a bcall when bc_serv is NULL When a rdma server returns a fault format reply, nfs v3 client may treats it as a bcall when bc service is not exist. The debug message at rpcrdma_bc_receive_call are, [56579.837169] RPC: rpcrdma_bc_receive_call: callback XID 00000001, length=20 [56579.837174] RPC: rpcrdma_bc_receive_call: 00 00 00 01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 04 After that, rpcrdma_bc_receive_call will meets NULL pointer as, [ 226.057890] BUG: unable to handle kernel NULL pointer dereference at 00000000000000c8 ... [ 226.058704] RIP: 0010:_raw_spin_lock+0xc/0x20 ... [ 226.059732] Call Trace: [ 226.059878] rpcrdma_bc_receive_call+0x138/0x327 [rpcrdma] [ 226.060011] __ib_process_cq+0x89/0x170 [ib_core] [ 226.060092] ib_cq_poll_work+0x26/0x80 [ib_core] [ 226.060257] process_one_work+0x1a7/0x360 [ 226.060367] ? create_worker+0x1a0/0x1a0 [ 226.060440] worker_thread+0x30/0x390 [ 226.060500] ? create_worker+0x1a0/0x1a0 [ 226.060574] kthread+0x116/0x130 [ 226.060661] ? kthread_flush_work_fn+0x10/0x10 [ 226.060724] ret_from_fork+0x35/0x40 ...
AI-Powered Analysis
Technical Analysis
CVE-2022-49321 is a vulnerability identified in the Linux kernel's handling of Remote Direct Memory Access (RDMA) transport for the Network File System (NFS) version 3 protocol, specifically within the xprtrdma module. The vulnerability arises when the RDMA server returns a fault format reply, but the NFSv3 client incorrectly treats this reply as a callback (bcall) despite the absence of a bc_serv (callback service). This misinterpretation leads to the rpcrdma_bc_receive_call function dereferencing a NULL pointer, causing a kernel NULL pointer dereference and resulting in a kernel crash (BUG). The kernel panic is triggered during the execution of the _raw_spin_lock function, as indicated by the call trace, which includes rpcrdma_bc_receive_call and ib_core module functions. This vulnerability can cause a denial of service (DoS) by crashing the affected Linux kernel, disrupting services relying on NFS over RDMA. The issue is rooted in improper validation of callback service presence before processing RDMA replies, leading to unsafe memory access. The vulnerability affects specific Linux kernel versions identified by the commit hash 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2, and no known exploits have been reported in the wild as of the publication date (February 26, 2025). No CVSS score has been assigned to this vulnerability yet.
Potential Impact
For European organizations, the impact of CVE-2022-49321 can be significant, especially for those relying on Linux servers using NFSv3 over RDMA for high-performance networked storage. The vulnerability can lead to kernel crashes, causing service interruptions and potential data availability issues. This is particularly critical for enterprises in sectors such as finance, telecommunications, research institutions, and cloud service providers that depend on stable and performant NFS storage solutions. The denial of service caused by this vulnerability could disrupt business operations, lead to downtime, and require emergency patching or system reboots, impacting operational continuity. Although no direct data breach or privilege escalation is indicated, repeated crashes could increase the risk of data corruption or loss in unstable environments. The absence of known exploits reduces immediate risk, but the vulnerability's presence in widely used Linux kernels means that attackers could develop exploits, especially targeting high-value infrastructure in Europe.
Mitigation Recommendations
To mitigate CVE-2022-49321, European organizations should: 1) Identify and inventory Linux systems using NFSv3 over RDMA, focusing on those running affected kernel versions (notably those around the commit 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2). 2) Apply the latest Linux kernel patches or updates that address this vulnerability as soon as they become available from trusted Linux distributions or upstream kernel sources. 3) If immediate patching is not feasible, consider disabling RDMA transport for NFS or fallback to TCP transport temporarily to avoid triggering the vulnerable code path. 4) Monitor kernel logs for messages related to rpcrdma_bc_receive_call or unexpected kernel panics indicative of exploitation attempts. 5) Implement robust system monitoring and alerting to detect and respond to kernel crashes promptly. 6) Engage with Linux distribution security advisories and subscribe to vulnerability feeds to stay informed about patch releases and exploit developments. 7) Test patches in controlled environments before deployment to ensure stability and compatibility with existing workloads.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Linux
- Date Reserved
- 2025-02-26T02:08:31.537Z
- Cisa Enriched
- false
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 682d982dc4522896dcbe565c
Added to database: 5/21/2025, 9:09:01 AM
Last enriched: 6/30/2025, 5:54:45 AM
Last updated: 8/12/2025, 5:39:13 AM
Views: 12
Related Threats
CVE-2025-22834: CWE-665 Improper Initialization in AMI AptioV
MediumCVE-2025-22830: CWE-362 Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition') in AMI AptioV
HighCVE-2025-43735: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Liferay Portal
MediumCVE-2025-40770: CWE-300: Channel Accessible by Non-Endpoint in Siemens SINEC Traffic Analyzer
HighCVE-2025-40769: CWE-1164: Irrelevant Code in Siemens SINEC Traffic Analyzer
HighActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.